Tag Archives: security

Go Ask Alec Baldwin

SSL apostate Ian G. refers to an article on estimation of loss due to a privacy breach.I think we are measuring the wrong thing, and operating on these assumptions is dangerous. From the article, a Forrester analyst says: “After calculating … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

It’s the Crime, Not the Tool

Tim Wilson at Dark Reading on IT Security: The New Big Brother: “To identify potential insider threats, IT must monitor end users’ behavior by scanning email, tracking network activity, and even watching employees for “trigger” events that might cause disgruntlement. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Privacy and Security Lessons from Criminal Enterprises: The Corner & PCI

Either you have heard the stories, or encountered first hand the difficulty in convincing an organization’s leaders to take adequate precautions to insure the privacy of identity related data, and maintain the integrity, confidentiality and availability of their information assets. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

No Ethics, No Guild, No Credibility

An article in the hometown press on our great state’s efforts to protect its citizens from crooked locksmiths and security guards with misdemeanors. Like many state licensing agencies, such as those watching over doctors, electricians and architects, the Private Security … Continue reading

Posted in Uncategorized | Tagged , , | 1 Comment

Too important to be left to the generals

Interesting discussion on the secret language of security. Which shovetails nicely into a panel discussion I saw yesterday. An assortment of CSOs and a Forrester analyst discussed the future of security. Essentially all the tech stuff is being outsourced, and … Continue reading

Posted in Uncategorized | Tagged , | 1 Comment

There is no physical access control.

I was thinking about the difficulty of accurately testing physical controls and identity today. People let people in areas based on a system of signals that indicate they are safe/authorized: badge, biometric (face, voice), dress (uniform, hard hat, clipboard). Gradations … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Hostage as Asset

Reading Two Wheels Through Terror by Glen Heggstad.A cracking adventure story ofthe author’s attempt to ride his KLR 650 from his home in Palm Springsto Tierra Del Fuego and back. I’m not yet finished, but have completedthe chapters that relate … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Initial Post

The initial post for this blog. A place where I plan on documenting my thoughts on privacy, security, and the world in general.

Posted in Uncategorized | Tagged , | Leave a comment